{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T19:06:28Z","timestamp":1772823988688,"version":"3.50.1"},"reference-count":74,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CIF-1717314"],"award-info":[{"award-number":["CIF-1717314"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1109\/tit.2021.3127920","type":"journal-article","created":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T22:42:14Z","timestamp":1637016134000},"page":"1279-1295","source":"Crossref","is-referenced-by-count":12,"title":["Diversity\/Parallelism Trade-Off in Distributed Systems With Redundancy"],"prefix":"10.1109","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8752-4306","authenticated-orcid":false,"given":"Pei","family":"Peng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7464-4242","authenticated-orcid":false,"given":"Emina","family":"Soljanin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7106-7523","authenticated-orcid":false,"given":"Philip","family":"Whiting","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174030"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408794"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2946464"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2796314.2745873"},{"key":"ref5","first-page":"185","article-title":"Effective straggler mitigation: Attack of the clones","volume-title":"Proc. 10th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Ananthanarayanan"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2015.7447111"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282699"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437467"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3067054"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2929328"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2015.7447112"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70087-8_73"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1077464.1077466"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2904055"},{"key":"ref15","first-page":"3368","article-title":"Gradient coding: Avoiding stragglers in distributed learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tandon"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2847220.2847223"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3055281"},{"key":"ref18","first-page":"373","article-title":"When to hedge in interactive services","volume-title":"Proc. Symp. Netw. Syst. Design Implement.","author":"Primorac"},{"key":"ref19","first-page":"2100","article-title":"Short-dot: Computing large linear transforms distributedly using coded short dot products","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"29","author":"Dutta"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2736066"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006960"},{"key":"ref22","first-page":"4403","article-title":"Polynomial codes: An optimal design for high-dimensional coded matrix multiplication","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Yu"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2963864"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3016078.2851190"},{"issue":"72","key":"ref25","first-page":"1","article-title":"Redundancy techniques for straggler mitigation in distributed optimization and learning","volume":"20","author":"Karakus","year":"2019","journal-title":"J. Mach. Learn. Res."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437871"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849684"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437322"},{"key":"ref29","article-title":"Communication-computation efficient gradient coding","author":"Ye","year":"2018","journal-title":"arXiv:1802.03475"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2018.8635903"},{"key":"ref31","article-title":"Analysis and lessons from a publicly available Google cluster trace","volume":"94","author":"Chen","year":"2010"},{"key":"ref32","article-title":"Towards understanding heterogeneous clouds at scale: Google trace analysis","volume":"84","author":"Reiss","year":"2012"},{"key":"ref33","first-page":"289","article-title":"GRASS: Trimming stragglers in approximation analytics","volume-title":"Proc. 11th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Ananthanarayanan"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2744607"},{"key":"ref35","article-title":"Optimizing redundancy levels in master-worker compute clusters for straggler mitigation","author":"Aktas","year":"2019","journal-title":"arXiv:1906.05345"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483236"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.140518"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2005.07.030"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/384268.378792"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535392"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3152042.3152047"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3199524.3199564"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3199524.3199530"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2406280"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.23919\/ITC.2017.8064362"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-51917-3_37"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2964791.2901499"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2628913"},{"issue":"1","key":"ref49","first-page":"135","article-title":"Priority based K-Erlang distribution method in cloud computing","volume":"10","author":"Banerjee","year":"2014","journal-title":"Int. J. Recent Trends Eng. Technol."},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2289382"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2988506"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3078505.3078553"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919929"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2015.7446992"},{"key":"ref55","first-page":"3368","article-title":"Gradient coding: Avoiding stragglers in distributed learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tandon"},{"key":"ref56","first-page":"15","article-title":"Erasure coding in windows azure storage","volume-title":"Proc. USENIX Annu. Tech. Conf. (USENIX ATC)","author":"Huang"},{"key":"ref57","volume-title":"Kubernetes Documentation","year":"2018"},{"key":"ref58","first-page":"22","article-title":"Mesos: A platform for fine-grained resource sharing in the data center","volume-title":"Proc. NSDI","volume":"11","author":"Hindman"},{"key":"ref59","first-page":"1223","article-title":"More effective distributed ML via a stale synchronous parallel parameter server","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ho"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v29i1.9195"},{"key":"ref61","article-title":"TensorFlow: Large-scale machine learning on heterogeneous distributed systems","author":"Abadi","year":"2016","journal-title":"arXiv:1603.04467"},{"key":"ref62","article-title":"Revisiting distributed synchronous SGD","author":"Chen","year":"2016","journal-title":"arXiv:1604.00981"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020426"},{"key":"ref64","first-page":"1223","article-title":"Large scale distributed deep networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Dean"},{"key":"ref65","article-title":"One weird trick for parallelizing convolutional neural networks","author":"Krizhevsky","year":"2014","journal-title":"arXiv:1404.5997"},{"key":"ref66","first-page":"685","article-title":"Deep learning with elastic averaging SGD","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref67","volume-title":"Probability and Random Processes","author":"Grimmett","year":"2020"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1002\/9781118445112.stat01100.pub2"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/bf02127580"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719062"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04898-2_436"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1960.10489897"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1002\/sapm195938177"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/S0021-9800(67)80075-9"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/18\/9687099\/9615053-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/9687099\/09615053.pdf?arnumber=9615053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T02:17:58Z","timestamp":1705025878000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615053\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2]]},"references-count":74,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tit.2021.3127920","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2]]}}}